key points

Results 51 - 75 of 84Sort Results By: Published Date | Title | Company Name
Published By: VMTurbo     Published Date: Feb 11, 2014
Moving beyond monitoring, alerting and reporting to deliver an automated control system for today's virtualized data centers.
Tags : 
vmturbo, sizing up, operations management, virtual infrastructure, it operations, analytic engine, decision-making process, storage infrastructure, optimize resources, virtualized applications, operational costs, collective model, abstraction model, big data, process automation, decision automation
    
VMTurbo
Published By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
Intel Security
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: IBM     Published Date: May 31, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, iot technology, digital transformation
    
IBM
Published By: IBM     Published Date: Jul 13, 2017
Leaders embracing the ioT are gaining new values, including accelerating innovation, enhancing operations, and improving engagement. Disruptors are utilizing the internet of things and recomposing their businesses by digital transformation. There are many different ways to unlock the potential of the internet of things. The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, innovation, enhancing operations, digital transformation, iot technologies
    
IBM
Published By: IBM     Published Date: Oct 18, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
internet, ibm, ibv, internet of things
    
IBM
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn about some common “data encryption myths” and the risks they pose.
Tags : 
protecting, student, institutional, privacy, data, encryption, education
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
This eBook will review the basics of data encryption; data concerns specific to ESS; how data encryption addresses the unique data security challenges facing ESS, and key points to consider when building the case for data encryption.
Tags : 
pii, protect, data encryption, ess
    
WinMagic Inc.
Published By: AMD FirePro     Published Date: Apr 18, 2012
A comprehensive overview of the AMD FirePro and Solidworks relationship, highlighting the key selling points, benchmarks, case studies, customer references, and much more.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization
    
AMD FirePro
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo and Intel®
Published By: IBM     Published Date: Oct 06, 2015
An infographic highlighting the key points of Saugatuck Technology's research, which studied the importance of sourcing in hybrid IT environments.
Tags : 
ibm, saugatuck, hybrid it, hybrid it environments, saugatuck technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.
Tags : 
ibm, security, mobile, enterprise, application
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
An infographic highlighting the key points of Saugatuck Technology's research, which studied the importance of sourcing in hybrid IT environments.
Tags : 
integration, it environment, cloud, business solutions, ibm
    
IBM
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion, customer satisfaction, site search, search strategy, business technology, search marketing, market research, e-commerce
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : 
cisco, education, mobile learning, mobile devices
    
Cisco
Published By: Basho     Published Date: Apr 07, 2015
This whitepaper looks at why companies choose Riak over a relational database. We focus specifically on availability, scalability, and the key/value data model. Then we analyze the decision points that should be considered when choosing a non-relational solution and review data modeling, querying, and consistency guarantees. Finally, we end with simple patterns for building common applications in Riak using its key/value design, dealing with data conflicts that emerge in an eventually consistent system, and discuss multi-datacenter replication.
Tags : 
basho, riak, relational database, nosql, common applications, simple deployments
    
Basho
Published By: Lenovo and Intel®     Published Date: Nov 03, 2017
How can you drive digital transformation? Find out in three steps! This eBook provides you with the details you need to drive digital transformation (DX) in your organization. Highlighted for you are the key decision points, a defined path to success, and the critical role devices play in helping your team maximize DX results. You’ll get: • Check lists • Device recommendations • How to leverage DX with other solutions Download the eBook now.
Tags : 
    
Lenovo and Intel®
Published By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : 
citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
Citrix
Published By: Falcon Social     Published Date: Oct 30, 2015
Stronger, more consistent experiences along the customer journey will build loyalty and customer lifetime value. A strategic look at improving across touchpoints—Download the Whitepaper. • Key touchpoints along the customer journey • Strategies for driving integration between departments • Examples and insights from leading companies
Tags : 
cross-channel marketing, customer lifetime value, customer journey, customer loyalty, social media marketing, social media campaigns, social media management software, social media tool, social media management tool, social media marketing tool, social media, customer experience/engagement, marketing research
    
Falcon Social
Published By: [x+1]     Published Date: Jan 24, 2007
Publishers spend millions generating content, designing user experiences, and promoting themselves as the destination of choice when people open up their browsers. In order to pay for the user's attention, they sell impressions. But who should publishers sell to? Be sure to consider the key points explained in this paper.
Tags : 
online ad sale, ad sales, online ad sales, ad serving, graphical/cpm, banner advertising, prestitials, interactive/pr agencies, interactive marketing
    
[x+1]
Published By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : 
human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
    
Data Guard Systems
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.